About your Search

20121112
20121120
Search Results 0 to 4 of about 5
in that environment. none of that is done without our dependence and our environmentment in the cyber world. the cyber domain and each and every one of us have become inseparable. tegnonk drives everything we do. -- technology drives everything we do. it resides in private sector. let me repeat that. the vast majority of our infrastructure in the united states resides in the private sector. the national security risks and the economic risks are still with the private sector. remember the government doesn't do it alone. our partners are the private sector. whether you work for the government or you work for private sector you can contribute no matter where you are. in whatever professional desire is. >> it's private sectors, holds as lot of data. and they're protection to the united states priorities is of a national important. the president declared recent lip and i quote. this is in the top five. the cyber threat is one of the most serious economic and national security challenges we face as a nation and america's economic prosperity in the sunshinery -- century depends on that. we have more informat
to address what needs to be done in that environment. none of that is done without our dependence and involvement in the cyber war. technology drives everything we do. the internet has made is more connected than at any other time. the vast majority of our infrastructure reside in private sector. let me repeat that. the vast majority of our infrastructure reside in the private sector. the national security risks and the economic risks are still with the private sector. the government does not do it alone. they do it in concert with our partners and our partners are the private sector. for those of you were talking to earlier, with the work for the government or the private sector, you can contribute no matter where you are in whatever your professional desire is. this private-sector holds a lot of data and these are pretty profound -- their protection of the priorities is he has a list of priorities. this is the top five. the cyber threat is among the most serious challenges we face as a nation, and america's prosperity will depend on cyber security. the united states does have a
were changing to get out of the environment and see how the war was being reported and get back in and get the story. i was traveling around with different officers. most of my time was spent traveling with general petraeus. to security areas and sitting in meetings with him in kabul. if there was not a lot of concern. that is the story reported over the year. we then fit in the biographical digressions. and what i tried to show and i pulled my dissertation were the variables that were influencing david petraeus' thinking. his social networks and his mentors. there are four mentors. holly has been a wonderful source of information. the second is keith running deal. he was -- nightingale. he helped to start the joint special operations trinity concentrate he had been involved in the hostage rescue. their letters show how he was thinking about special operations and that community which not all of people know he has that background and interest in. albeit a sort of academic interest. the third key mentor and most influential is general jack galvin. he was assigned with gen. galvin
analysis in both hard copy, open source, classified, and the cyber environment, to inform these said policy-makers and defenders of the cyber threat. there are four big players -- dhs, responsible for the u.s. infrastructure in terms of how we are protecting our homeland. the fbi does have the law enforcement peace. those here this morning and know exactly why they have that. nsa, also known as cyber command, has the cyber command to drive the entire structure and the policies by which we are going to deploy various networks around the world. cia doesn't do that work but we can't do our work without collaborating am working with each of them. despite the fact that sometimes the matter what the news says, you do not do this alone. we do it with all our partners in the public and private sector. cia does partner with our agencies. we do, i heard a lot about for each of you, you talked about co-ops, internships, opportunities. the partner with these agencies to leverage our own employees and prospective employees to get the best match for the person. we are investing in the future and the futu
in this consolidated apple like checkout, iphone, anyone can check you out, it's efficient, nice environment. it's the apple store customer interface combined with the best brands of the world in a small geography. we had $250 a square foot in sales with the traffic down 12%. >> for your sake and for ron johnson's sake i hope this works and i love a great come back story. >> i want to leave our viewers with one thing. the biggest problem people have with something like this, how can i own a stock when the sales are down 26%? i'll make one analogy and help people think about how to value this company. we took a stake in wendy's, why did people not like wendy's? i get a chance we come back after a commercial, i'm happy to stay. >> i think we're going. >> give me one minute and i'm happy to come back another time. wendy's, people hated the management, there was a fast growing company called tim horton's inside wendys. we separated and the stock doubled. we have this fast growing retail inside jcpenney, profitable and high margins and the rest of jcpenney is shrinking. it's hard to look at it on a c
Search Results 0 to 4 of about 5